Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Should allow deserialization of java.time types via opaque JsonToken.VALUE_EMBEDDED_OBJECT #3091

Closed
cowtowncoder opened this issue Mar 26, 2021 · 2 comments
Milestone

Comments

@cowtowncoder
Copy link
Member

Jackson 2.12 added a safety feature #2683 which will block attempts to read/write java.time.* values if no explicit value serializer/deserializer found (which implies Java 8 date/time module is not registered).

While this makes sense on its own, it does have the downside that it is not possible to pass such values as opaque/embedded/POJO values, to use via ObjectMapper.convertValue() for example, or store in JsonNode.
Such use can be useful for some processing pipelines, and seems like it should be allowed.

@cowtowncoder cowtowncoder added to-evaluate Issue that has been received but not yet evaluated 2.13 and removed to-evaluate Issue that has been received but not yet evaluated labels Mar 26, 2021
@cowtowncoder
Copy link
Member Author

Note to self: I think this should go in 2.13 to reduce likelihood of a regression in 2.12 from change to deserializers.

@cowtowncoder
Copy link
Member Author

Should be fixed now by change to UnsupportedTypeDeserializer which allows such operation (could consider adding similar general handling to other base deserializers maybe).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant